SecurityFocus

Results for SecurityFocus

by Piotr Bania
Introduction
This article has been written to show that is possible to write shellcode for Windows operating systems that doesn't use standard API calls at all. Of course, as with every solution, this approach has both ...

by Yiming Gong
With the emergence of Napster in the fall of 1999, peer to peer (P2P) applications and their user base have grown rapidly in the Internet community. With the popularity of P2P and the bandwidth it consume, there is a growing need to ...

by Paul Asadoorian
IPAudit is a handy tool that will allow you to analyze all packets entering and leaving your network. It listens to a network device in promiscuous mode, just as an IDS sensor would, and provides details on hosts, ports, and ...

by Piotr Bania
This short article describes the so-called Entry-Point Obscuring (EPO) virus coding technique, primarily through a direct analysis of the Win32.CTX.Phage virus. The reader should know the basics of IA-32 assembly and the main elements ...

by Israel G. Lugo, Don Parker
In http://www.securityfocus.com/infocus/1839 ">part one of this article series we looked at how a personal firewall actually works and where it taps into the network stack to do its filtering. In part two ...

by Israel G. Lugo, Don Parker
The concept of a firewall still brings to mind the picture of an impenetrable brick wall, the unsurpassable magic protector of all that is good. The bold statements made by today's security vendors only emphasize ...

by Dr. Steven Furnell, Dr. Jeremy Ward
It is now twenty years since Fred Cohen published his seminal research paper suggesting the potential threat of computer viruses. [ ref 1 ] In the years since this publication, the risk that Cohen described ...

by Marek Bialoglowy
In part 1 of this article, we introducted Bluetooth and some of its security and privacy issues, including how it is detected and some implementation issues from various mobile phone vendors. Now in part 2 we look ...

by Andre Lue-Fook-Sang
1.0 Introduction
Do most people ever worry about the security of their Intrusion Detection System (IDS)? They should. With high speed Internet access being so common around the world, many personal PCs are ...

by Keith J. Jones, Rohyt Belani
Reviewing part one
Welcome to part two of the Web Browser Forensics series. In part one , we began investigating the intrusion of the Docustodian document management server hosting a law ...